Results 21 to 30 of about 626,939 (346)

Controlling chaos in a chaotic neural network [PDF]

open access: yes, 2003
The chaotic neural network constructed with chaotic neuron shows the associative memory function, but its memory searching process cannot be stabilized in a stored state because of the chaotic motion of the network.
Cao, Prof. Z.   +3 more
core   +1 more source

A Study on the Application of Henon with a Case Study of Ecology [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2004
This paper deals with the well known Henon map. Its main properties are studied as well as a non deterministic form. Least squares estimates of parameters of the non deterministic model are driven and a case study from animal ecology is studied, where ...
Basil Al-Khayat, Inaam Abd
doaj   +1 more source

A chaotic circuit based on Knowm memristor: modeling, analysis, and experimental verification

open access: yesShenzhen Daxue xuebao. Ligong ban, 2023
Previous research on memristors and their chaotic applications has mainly focused on the use of memristor emulators, with little research on constructing the chaotic circuit using real memristors.
WANG Faqiang
doaj   +1 more source

ON EQUIVALENCE OF LINEAR CONTROL SYSTEMS AND ITS USAGE TO VERIFICATION OF THE ADEQUACY OF DIFFERENT MODELS FOR A REAL DYNAMIC PROCESS

open access: yesJournal of Optimization, Differential Equations and Their Applications, 2020
A problem of description of algebraic invariants for a linear control system that determine its structure is considered. With the help of these invariants, the equivalence problem of two linear time-invariant control systems with respect to actions of ...
Vasiliy Ye. Belozyorov   +2 more
doaj   +1 more source

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj   +1 more source

IBGJO: Improved Binary Golden Jackal Optimization with Chaotic Tent Map and Cosine Similarity for Feature Selection

open access: yesEntropy, 2023
Feature selection is a crucial process in machine learning and data mining that identifies the most pertinent and valuable features in a dataset. It enhances the efficacy and precision of predictive models by efficiently reducing the number of features ...
Kunpeng Zhang   +4 more
doaj   +1 more source

Abrupt bifurcations in chaotic scattering : view from the anti-integrable limit [PDF]

open access: yes, 2013
Bleher, Ott and Grebogi found numerically an interesting chaotic phenomenon in 1989 for the scattering of a particle in a plane from a potential field with several peaks of equal height.
Baesens, Claude   +2 more
core   +1 more source

Chaotic Delone sets

open access: yesDiscrete & Continuous Dynamical Systems, 2021
We present a definition of chaotic Delone set, and establish the genericity of chaos in the space of $( , )$-Delone sets for $ \geq $. We also present a hyperbolic analogue of the cut-and-project method that naturally produces examples of chaotic Delone sets.
Álvarez López,, Jesús Antonio   +4 more
openaire   +7 more sources

Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map

open access: yesJournal of Sensor and Actuator Networks, 2023
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as
Ahmad Al-Daraiseh   +5 more
doaj   +1 more source

Chaotic tatonnement [PDF]

open access: yesEconomic Theory, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bala, Venkatesh, Majumdar, Mukul
openaire   +1 more source

Home - About - Disclaimer - Privacy